Sentry Security Model: 7 Pillars

Cybersecurity is serious business. Sentry is designed to deliver everything a business needs to secure, monitor, manage and maintain their IT infrastructure. These 7 pillars are the ties that bind Sentry together.

1. All-in-One Security Solution

An all-in-one solution has to be cohesive. Managing security is hard enough without having to mesh together services from different vendors. Sentry makes security management simple by bringing everything together under one roof.

2. Cross-Platform Compatibility

It’s not an all-in-one solution if it won’t run on any system. Sentry offers full Windows, OS X and even Linux compatibility. Light mobile device management capabilities as well.

3. Mission and Purpose

Security is systematic by nature, and so is our approach. Our mission is to maximizethreat detection and minimizethreat exposure. We carry out that mission one layer at a time.

4. Layered Security Model

Network security is a complicated process. No one can argue with that. But taking a modular approach simplifies the complexity. After all, the whole is simply the sum of the parts.

Maximum Threat Detection

The purpose of utilizing a layered approach is to provide multiple opportunities for threat detection. Each layer is designed to defend against a threat at a specific point of weakness. For a threat to successfully penetrate the system, it must bore through every layer.

Total Flexibility

Each layer is configured to meet the specific needs not only of that business, but of that specific computer (and it’s user). For example, an HR or accounting department will have higher security needs than your purchasing department due to the sensitive nature of the data. Turning off unnecessary layers saves resources and increases network efficiency.

Layered Security Data Sheet

5. Data-Driven Proactivity

Awareness is fundamental to security. If no one is watching, well, anything can happen.Sentry takes watching to the next level with a proactive system of automated checks that can be configured to run anywhere from daily to every twenty minutes.

Health and integrity monitoring is essential to budgeting and planning upgrades. And we are the eyes and ears. Now, rather than reacting to the expense of broken systems and downtime, thresholds are set that send SMS/email alerts to IT staff when breached. These alerts tell us that it’s time to talk to you about upgrades.

Proactive Security Data Sheet

6. Totally Managed

User error is a leading small business security risk, and a huge obstacle to our mission of minimizing threat exposure. Let’s face it– security isn’t the first thing on the minds of your employees. Relying on them to regularly carry out essential security tasks creates security lapses and loopholes.

Sentry eliminates the possibility of user error by removing them from the equation: we manage everything for you. Not only are we trained to be network watchdogs, we’ve got the tools and reports that make it simple.

This is the way IT is supposed to be.

Fully Managed Data Sheet

7. Constantly Evolving

In technology, standing still gets you run over. Hackers won’t quit. They continue to adapt new threats designed to wreak havoc upon data. And we don’t quit either. Risk Intelligence is the newest member of the Sentry family, making risk management and compliance simple. Currently a password management system designed to meet compliance needs is in the works.